Available here

About the Workshop

OSEW brings the architecture/systems-security community together to make progress towards building open-source, secure, performant enclaves. In particular, we will discuss the different, realistic threat models, the components for secure enclaves, best practices and state-of-the-art techniques for each component, and open problems in this space. Our previous agenda and information (OSEW 2018) is available.

The workshop will include invited talks from different research and industry groups on relevant topics, panel discussions on current topics, and contributed talks. The schedule will be updating over the coming weeks with exciting talks.
Announcements will be made on the Keystone mailing list here.


Time Title Speaker
8:30am - 9:00am Breakfast & Registration
9:00am - 10:00am Selected Talks
10:00am - 10:15am Break
10:15am - 12:00pm Hardware and TEE Systems
12:00pm Group Photo
12:00pm - 1:00pm Catered Lunch
1:00pm - 2:00pm Side-channel Attacks and Defenses on TEEs
2:00pm - 3:00pm Use-cases for TEEs
3:00pm - 3:15pm Break
3:15pm - 4:35pm Safe Languages and Frameworks for TEEs
4:35pm - 4:50pm Break
4:50pm - 6:00pm Verification for safer TEEs

Organizing Committee

Krste Asanović (UC Berkeley and SiFive),
David Kohlbrenner (UC Berkeley),
Dayeol Lee (UC Berkeley),
Shweta Shinde (UC Berkeley),
Dawn Song (UC Berkeley and Oasis Labs),
Mohit Tiwari (UT Austin)

Call for Presentations

We are seeking presentations on, including but not limited to:
  • Open-source enclave systems
    • Keystone, Sanctum, OPTEE extensions, etc
  • Application use-cases beyond cryptography and lib-OSes
    • We are especially interested in small edge-deployed needs (IoT sensors, etc)
  • SDKs and programming models
    • Programming language solutions to partitioning, cross-platform SDKs (Asylo, OpenEnclave, etc)
  • Alternative trust models and deployment strategies
    • Where and how should device provisioning and personalization occur?
  • Implementation on RISC-V and other ISAs
    • Enclaves and integration for non-CPU devices (GPUs, FPGAs, etc.)
      • Should enclaves extend into these devices, or should they supply their own TEE?
    • Hardware TEE features
      • Efficient memory encryption, peripheral access controls, etc
    • Secure hardware design and fabrication
      • Life-cycle challenges, secure fabrication, etc
    • Verification for secure hardware
    Please submit a talk summary via the form here with contact information. Talks will be 10 minutes or 30 minutes based on scheduling and content.